Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[SPARK-34752][BUILD] Bump Jetty to 9.4.37 to address CVE-2020-27223 #31846

Closed

Conversation

xkrogen
Copy link
Contributor

@xkrogen xkrogen commented Mar 15, 2021

What changes were proposed in this pull request?

Upgrade Jetty version from 9.4.36.v20210114 to 9.4.37.v20210219.

Why are the changes needed?

Current Jetty version is vulnerable to CVE-2020-27223, see Veracode for more details.

Does this PR introduce any user-facing change?

No, minor Jetty version change. Release notes can be found here.

How was this patch tested?

Will let GitHub run the unit tests.

@dongjoon-hyun dongjoon-hyun changed the title [SPARK-34752] Bump Jetty to 9.4.37 to address CVE-2020-27223 [SPARK-34752][BUILD] Bump Jetty to 9.4.37 to address CVE-2020-27223 Mar 15, 2021
@AmplabJenkins
Copy link

Refer to this link for build results (access rights to CI server needed):
https://amplab.cs.berkeley.edu/jenkins//job/SparkPullRequestBuilder/136081/

@github-actions github-actions bot added the BUILD label Mar 15, 2021
@AmplabJenkins
Copy link

Refer to this link for build results (access rights to CI server needed):
https://amplab.cs.berkeley.edu/jenkins//job/SparkPullRequestBuilder-K8s/40664/

@HyukjinKwon
Copy link
Member

Merged to master and branch-3.1.

HyukjinKwon pushed a commit that referenced this pull request Mar 16, 2021
Upgrade Jetty version from `9.4.36.v20210114` to `9.4.37.v20210219`.

Current Jetty version is vulnerable to [CVE-2020-27223](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27223), see [Veracode](https://www.sourceclear.com/vulnerability-database/security/denial-of-servicedos/java/sid-29523) for more details.

No, minor Jetty version change. Release notes can be found [here](https://github.com/eclipse/jetty.project/releases/tag/jetty-9.4.37.v20210219).

Will let GitHub run the unit tests.

Closes #31846 from xkrogen/xkrogen-SPARK-34752-jetty-upgrade-cve.

Authored-by: Erik Krogen <xkrogen@apache.org>
Signed-off-by: HyukjinKwon <gurwls223@apache.org>
(cherry picked from commit 4a6f534)
Signed-off-by: HyukjinKwon <gurwls223@apache.org>
@xkrogen xkrogen deleted the xkrogen-SPARK-34752-jetty-upgrade-cve branch March 16, 2021 15:40
@xkrogen
Copy link
Contributor Author

xkrogen commented Mar 16, 2021

Thanks for the fast turnaround @dongjoon-hyun and @HyukjinKwon !

flyrain pushed a commit to flyrain/spark that referenced this pull request Sep 21, 2021
Upgrade Jetty version from `9.4.36.v20210114` to `9.4.37.v20210219`.

Current Jetty version is vulnerable to [CVE-2020-27223](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27223), see [Veracode](https://www.sourceclear.com/vulnerability-database/security/denial-of-servicedos/java/sid-29523) for more details.

No, minor Jetty version change. Release notes can be found [here](https://github.com/eclipse/jetty.project/releases/tag/jetty-9.4.37.v20210219).

Will let GitHub run the unit tests.

Closes apache#31846 from xkrogen/xkrogen-SPARK-34752-jetty-upgrade-cve.

Authored-by: Erik Krogen <xkrogen@apache.org>
Signed-off-by: HyukjinKwon <gurwls223@apache.org>
(cherry picked from commit 4a6f534)
Signed-off-by: HyukjinKwon <gurwls223@apache.org>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
4 participants